authentication


This is part two of our look at the User layer, which focuses on user authentication. If you missed it, make sure to read part 1 to find about how you can protect your network from your users’ own actions. Also, you can catch up on the entire Layered Security series by either reading my past blog posts or checking out the PDF version, which will be updated to include the User Layer soon. The User Layer: Part 2 Last time we talked about user education, as well as a range of FortiOS security features that you can use to protect... [Read More]
by RSS Victoria Martin  |  Aug 24, 2015  |  Filed in: Security Q & A
As you surely know by now, Apple has announced its iPhone 5S would include a fingerprint sensor. In a first blog post, we discussed its use as a second form of authentication, and in another post, the fact the sensor scans sub-epidermally. Apple tells us "All fingerprint information is encrypted and stored securely in the Secure Enclave inside the A7 chip on the iPhone 5s; it's never stored on Apple servers or backed up to iCloud." So, how does the 'Secure Enclave' work, and are we sure our fingerprint will remain locked up in the A7 processor? ARM's... [Read More]
by RSS Axelle Apvrille  |  Sep 16, 2013  |  Filed in: Security Research